This chapter provides an overview of cryptography concept. It`s required to encrypt and maintain confidentiality of the information to be transmitted over the network. This is achieved through cryptography. Cryptography plays a vital role in securing the information when transmitted across the network. It helps in maintaining the integrity of the information stored on the network. Thus, security is one of the important concepts to be explored in the world of network security.
Some of the security challenges that we commonly face are: maintaining integrity and confidentiality of the information, encrypting the information and sharing of information. To address these challenges, it is very important for you to explore cryptography concepts
…show more content…
The process of cryptology involves converting an actual message into an encrypted format using a secret key, which is shared between the source and destination.
The concept cryptography has been adopted in the organisations to:
a. Secure information that is been transmitted across the network
b. Maintain integrity of the information on the network
c. Convert the message into an unreadable format
d. Support many security activities on the network such as, data hiding/encapsulation, and steganography.
Let us understand the process of cryptography with the help of an example given below. Figure 3.1.1: Cryptography Overview
As per Figure 3.1.1, Alice and Bob are communicating with each other. The communication happens between Alice and Bob through a secured channel using the process of cryptography. This process converts the original plain text to an unknown text such as ciphertext, which helps to protect the information through the secured channel.
Cryptography concept is based on two important entities:
i. Plain Text
ii.
…show more content…
The sender uses session key to encrypt the message using its public key. Receiver decrypts the message using share session key with the help of destination`s private key. During this process the sender and receiver ensures that the message is maintained confidential during the transmission on the network.
Alice wants to send the information to Bob through the secured channel. The information transmitted from Alice to Bob is maintained confidential till it reaches the destination.
For example:
1. When managers shares some confidential information with their subordinates or colleagues in the office, the employees should ensure that the information shared by their managers are kept confidential and is not leaked outside the organisation.
2. The information stored in the federal agency websites or server is treated to be highly confidential, as it contains various data related to government business.
b. Integrity
The information transmitted between sources to the destination is maintained confidentially. The protocol that governs the confidentiality of information from source to destination is called
Confidentiality has several different levels that include employee, management, and business information. Employee data includes personal identifying information, disability and medical information, etc. Keeping this material confidential is important because the information could lead to criminal activity to include fraud or discrimination; this can result in decreased productivity and affect employee morale. Management information covers impending layoffs, terminations, workplace investigation of employee misconduct, etc. It should go without saying that sensitive data should only be available to management. Lastly, the business portion includes business plans, company forecasts, and special ingredients/recipes, information that would not be readily available to competitors. Employees and managers should receive training on how to properly handle confidential information (Jules Halpern Associates, LLC,
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
(2012) suggest that communication is a process that involves a sender, a receiver, a message and a channel. The sender and the receiver of the communication may be the professionals and the channels of communication may be through hand over’s, emails, phones calls, verbal discussion and other relevant communication channel
PKC is the enabling technology for all Internet security and the increasing use of digital signatures, which are replacing traditional signatures in many contexts. However, RSA is better than PKC because RSA doesn’t need digital signature. As a result, the RSA algorithm turned out to be a perfect fit for the implementation of a practical public security system. In 1977, Martin Gardner first introduced the RSA system. After 5 years, company RSA used secure electronic security products. Nowadays many credit companies of all over the world use the RSA system or a similar system based on the RSA system.
The communication process model was illustrated in the beginning of the film when the receptionist sends out the instants message to other employees to warn them of Margret who was making her way to the office. The information got through the office before Margret walks in and everyone pretended to be working in her presence as she walked through the office. This illustrates how fast information was send through electronic communication and the receivers understood what the message meant. The employees knew how to act and avoid getting in the way of Margret before she walked in. The receptionist who originally sends out the message received the feedback through indirect evidence from the employee’s action which meant that the receiver understood the transmitted message.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Explain how the two important transport protocols deliver messages on behalf of the application and discuss the differences between them
The protection of data being transferred between ATMs and the bank, and the use of cell phones is the most common everyday encounter with encryption. To encrypt and decrypt information a cipher is used. In a cipher there is a set of well-defined steps that can be followed to encrypt and decrypt messages. The use of a cipher relies greatly on the use of an encryption key. The key may contain any auxiliary information added to the cipher to produce certain
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Communication is the process of exchanging and understanding the information. The Internet has change the communication over the last decades. Communication is a dynamic, contiguous, irremeable and interactive.
a) There is no physical appearance of the communicator and the receiver since it is via online.